Performance Analysis of CSMA/CA and PCA for Time Critical Industrial IoT Applications

Size: px
Start display at page:

Download "Performance Analysis of CSMA/CA and PCA for Time Critical Industrial IoT Applications"

Transcription

1 This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TII , IEEE Performance Analysis of CMA/CA and for Time Critical Industrial IoT Applications M. P. R.. Kiran and P. Rajalakshmi Abstract Recently proposed IEEE MAC introduced a new Prioritized Contention Access () for transfer of time-critical packets with lower channel access latency compared to CMA/CA. In this paper, we first propose a novel Markov chain based analytical model for unslotted CMA/CA and for industrial applications. The unslotted model is further extended to derive the analytical model for slotted CMA/CA and. Primary emphasis is laid on understanding the performance of compared to CMA/CA for different traffic classes in industrial applications. The performance analysis shows the slotted achieves a reduction of 63.3% and 97% in delay and power consumption respectively compared to slotted CMA/CA, whereas unslotted achieves a delay reduction of 53.3% and reduction of power consumption by 96% compared to unslotted CMA/CA without any significant loss of reliability. The proposed analytical models for both slotted and unslotted IEEE MAC offer satisfactory performance with less than 5% error when validated using Monte Carlo simulations. Also, the performance is verified using real-time testbed. Index Terms Industrial Internet of Things, IEEE , CMA/CA, Prioritized Contention Access, Markov chain I. ITRODCTIO In recent years, industrial applications such as monitoring, controlling, automation, etc., have witnessed a significant increase in usage of the Internet of Things (IoT) technologies for communication [] [3], especially IEEE [4], [5]. Also, a new Prioritized Contention Access () is introduced in IEEE MAC to provide service differentiation in IoT applications [6]. Transfer of prioritized or critical data with low latency plays a crucial role in industrial monitoring and automation applications [7], [8]. The existing IEEE e supports time-slotted channel hopping (TCH) where the assigned time slots are used for communication between the nodes, and frequency hopping is used to mitigate the effects of fading [9]. Traditional CMA/CA suffers from increased channel access delay with an increase in traffic or number of nodes. nlike CMA/CA, offers faster channel access without any significant loss of reliability. Hence, a time-critical packet uses and CMA/CA for normal packet transmission. In this paper, using Markov chains, we model the CMA/CA and in both beacon-enabled and nonbeacon-enabled personal area network (PA) and derive the performance metrics (reliability, delay, and power consumption). Our primary contributions in this paper include: The authors are with the Department of Electrical Engineering, Indian Institute of Technology Hyderabad, Hyderabad 52285, India ( ee2m2@iith.ac.in; raji@iith.ac.in). Mathematical formulation for analyzing the performance of unslotted and CMA/CA in a nonbeacon-enabled PA. Mathematical formulation for analyzing the performance of slotted and CMA/CA in a beacon-enabled PA. Validation of proposed analytical models for both slotted and unslotted channel access using a real-time testbed and Monte Carlo simulations. Performance comparison of and CMA/CA in both beacon-enabled and nonbeacon-enabled PA. Rest of this paper is organized as follows. ections II discusses the existing studies, and ection III provides the brief description of contention based random channel access schemes in IEEE standard respectively. ection IV provides the mathematical formulation for nonbeacon-enabled PA, and mathematical formulation for beacon-enabled PA is discussed in ection V. Performance and validation of proposed analytical models using Monte Carlo simulations and real-time testbed are provided in ection VI. Finally, section VII concludes the paper by discussing the future scope of this work. II. RELATED ORK Accurate analytical models of this kind aid in understanding the performance and suitability of channel access mechanisms and aid in optimizing the operational parameters leading to efficient network operation. Many studies to analyze the performance of IEEE CMA/CA exist [] [8] and very few studies analyzed the performance of. Authors in [] and [] used event chains and Markov models respectively to analyze slotted CMA/CA but the performance of is not considered. In [2], authors analyzed the performance of dense traffic multi-hop networks. In [3], Pollin et al. considered star topology under saturated and unsaturated traffic conditions without retransmissions. The models proposed in [4] [6] analyzed the impact of CMA/CA parameters, the number of nodes, and data frame size on the network throughput and energy efficiency, but do not discuss the performance of. Although in this study we did not consider throughput as a performance metric, one can refer to [5] to extend this model to derive the throughput. In [7], [8], authors analyzed the performance of IEEE MAC considering the effects of noisy environments and channel fading but do not consider. Gebremedhin et al. in [9] analyzed the performance of using only simulation model and no analytical model is considered. In [2] and [2], the authors investigated the (c) 28 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. ee for more information.

2 This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TII , IEEE 2 TABLE I: ummary of primary notations used for modeling Parameter η h p L c L s L p L ack n m macminbe macmaxbe τ P Q b, b i,k b i,k,j p i,k τ RCMA RCMA DCMA DCMA PCMA PCMA P fr P fc P de P dc Description Probability of at least one packet availability in the queue Probability of the available packet being time critical Packet collision duration uccessful packet duration Packet duration Acknowledgment duration Max. no. of retries o. of backoff stages Min. backoff exponent Max. backoff exponent CCA busy probability CCA2 busy probability Probability for collision Probability of a node in CCA o. of nodes in the network Probability of the node residing in Idle state Probability of node residing in the state (,) of unslotted CMA/CA Probability of unslotted CMA/CA states Probability of slotted CMA/CA states Probability of states Probability of node attempting CCA in an arbitrary time Reliability of unslotted CMA/CA Reliability of slotted CMA/CA Delay of successfully transmitted packet using unslotted CMA/CA Delay of successfully transmitted packet using slotted CMA/CA Power consumption of unslotted CMA/CA Power consumption of slotted CMA/CA Probability of normal packet discard due to exceeded retransmissions Probability of normal packet discard due to channel access failure Probability of packet being discarded due to delay expiry in Probability of packet being discarded due to collision in performance of frame slotted aloha for low energy critical infrastructure monitoring (LECIM) applications. Hence to the best of our knowledge, this is the first study which provides the theoretical model for the behavior of along with CMA/CA in both beacon-enabled and nonbeacon-enabled PA. III. COTETIO BAED RADOM CHAEL ACCE MECHAIM I IEEE TADARD The Personal Area etwork (PA) using IEEE MAC supports both beacon-enabled and nonbeaconenabled operation. In a beacon-enabled PA, the node waits for a periodic beacon from the coordinator and synchronizes to the superframe structure after which it employs either slotted CMA/CA or slotted for the channel access. lotted is chosen whenever a time-critical packet needs to be transmitted. hereas in the nonbeacon-enabled PA, the coordinator does not transmit any beacon and the nodes use unslotted CMA/CA or unslotted for transmission depending on the packet criticality. lotted? TB = TB TB =? BE=max(,macMinBE-) BE=max(,macMinBE-) TB = random(2 BE -) TB = random(2 BE -) delay = C = C delay = delay = delay+ delay = delay+ delay> critdelay Perform CCA Channel idle? uccess Failure TB = TB delay> critdelay Locate backoff boundary Perform CCA Channel idle? TB =? C = C C =? uccess Failure Fig. : Operation of slotted and unslotted the validity of data expires. Then the node selects a backoff waiting time (TB) randomly chosen from [,2 BE ] where BE = max(,macminbe ) and macminbe is the minimum backoff exponent. A backoff period in IEEE lasts for a duration of 2 symbols (i.e., 32µs). The node continuously monitors the channel and decrements T B by one only if the channel is free. After every channel sensing, the node updates the delay and discards the packet if the node does not get channel access before the specified critdelay. This process continues until the node gets access to the channel after TB =. In slotted, the backoff boundaries of all the nodes are aligned with the start of the periodic superframe, and channel sensing is performed at the beginning of a backoff boundary. Also, slotted uses Contention idth (C ) equals to C where the node performs CCA successively and transmits the packet only if the channel is free during the entire period of the C. sually C is two backoff periods, and once the node finishes backoff waiting (TB = ), the node performs CCA and decrements C if the channel is clear, and proceeds to transmission if C=. If the channel is found busy during the C, C is reset to C, and the node repeats the same process. The slotted uses acknowledgments received from coordinator to make sure the packet is transmitted successfully. A. Prioritized Contention Access Mechanism () Fig. describes the channel access flow using both slotted and unslotted. Initially, a delay counter is started on the arrival of a time-critical packet which updates after every Clear Channel Assessment (CCA) performed. critdelay is the maximum delay specified by the application within which the time critical data needs to be transmitted after which B. Carrier ense Multiple Access - Collision Avoidance (CMA/CA) At the beginning of the unslotted CMA/CA, TB is initialized to a value randomly chosen from [, ) where = 2 macminbe. After the backoff waiting, the node performs CCA and starts transmission if the channel is free else it increments the BE (BE=BE+) and selects a random backoff from (c) 28 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. ee for more information.

3 This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TII , IEEE 3 [, ), where = 2 min(macmaxbe,be) andmacmaxbe is maximum backoff exponent. The node repeats the same process until the number of backoff stages ( B) exceeds the specified maximum backoff stages (macm axbackof f s) after which the packet is discarded. imilar to unslotted, unslotted CMA/CA employs no acknowledgment (ACK), whereas the slotted CMA/CA relies on acknowledgment (ACK). Also, slotted CMA/CA employs contention width C = C. As CMA/CA is well studied in the literature, we advise the readers to refer [6], for a more detailed operation of CMA/CA. hile the nonbeacon-enabled channel access is decentralized, improves throughput, and reduces the delay, the beaconenabled channel access is complex as the nodes require tight synchronization with the beacon superframe. The channel access in slotted mode requires performing CCA for a C of 2 which helps in the detection of ACK transmission by the gateway. hereas in the case of unslotted channel access the CCA is performed only once which increases collisions if ACK is employed. Also, usage of ACK leads to increased energy consumption [4], [22]. Hence, in this study, unslotted channel access is used with no acknowledgments (ACK), meaning that if a collision occurs, the transmitting node still proceeds to serve a new packet. For the mathematical formulation, we consider below acceptable assumptions which are in agreement with the existing popular studies in the literature. []. ) e assume the traffic overhead due to periodic beacon frame communication from the gateway is negligible. 2) Ideal channel conditions are considered. IV. MATHEMATICAL FORMLATIO FOR LEAF ODE OPERATIG I OBEACO-EABLED PA (IG LOTTED AD LOTTED CMA/CA) Fig. 2 shows the developed Markov chain model for unslotted CMA/CA with the node in the Idle state (Q) during the absence of packets. Each state in the Markov chain corresponds to a unit backoff period duration (2 symbols). η and h p represent the packet generation probability and the probability of the available packet being time-critical respectively. pon the availability of a normal packet with probability η( h p ), the node uses unslotted CMA/CA and selects a random backoff waiting time. These backoff waiting periods are represented using states (i,k), i [,m], k [, ) in the Markov chain. The states (i,), i [,m] represent the CCA. and indicate the probability of collision and channel being busy during the CCA respectively with L s and L c indicating the successful and collision packet lengths in terms of unit backoff periods. The states ( 2,k) and ( 3,k) represent packet collision and successful transmission states, whereas m represents the maximum backoff stages after which the packet is discarded due to channel access failure. Fig. 3 shows the Markov chain of used for timecritical packets with probability. The states are guided by a two-dimensional stochastic process (c(t), d(t)) where c(t) represents the backoff waiting counter and d(t) represents the delay incurred by the packet in terms of unit backoff period. 3, 2, Pc Pc Pc Pc Pc Pc 2,Lc 3,Ls Q,, m m, η η( hp),, m, m,, m,m Fig. 2: Markov chain model for unslotted CMA/CA 3, 2, -2,L c -3,L s -,, 2,, -,2,2 2,2,2 -,3,3 2,3,3 -,4,4 2,4,4 -,d,d 2,d,d,d,d 2,d,d Q η Fig. 3: Markov chain model for unslotted Hence, at the beginning of, the initial states that can be chosen, will all have the second dimension set to. upposing the node chooses backoff waiting time i, then it transits from the Idle state to (i,). After performing CCA, if the channel is found free the node transits from (i,) to (i,2) else it transits to (i, 2). In both the transitions, the second dimension is incremented as the node will have incurred with one backoff period delay in the previous state while performing CCA. This procedure continues until the node gets channel access within critdelay number of backoff periods and if the node incurs a delay equal to critdelay before accessing the channel, the packet is discarded. In the Markov chain, we represented the critdelay as d. Therefore, if the node reaches any of the states (i, d), the packet will be discarded, and the node transits to the Idle state. If the node gets channel access before critdelay, the node proceeds to transmission and the corresponding states are represented using ( 3, k) and ( 2, k) for both successful and collision respectively. One thing to note here is the state Q is common for both the Markov chains (unslotted CMA/CA in Fig. 2 and unslotted in Fig. 3). For clear discrimination between the states of CMA/CA and, we represent the CMA/CA state probabilities using b i,k and those of using p i,k. Table I summarizes the primary notations used for mathematical formulation. As Q is common for both unslotted and unslotted CMA/CA, P Q represents the probability of node residing in Q. From Fig. 2, the below transition probabilities can be formulated. P(i,k i,k+) =, i [,m], k [, i ), () (c) 28 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. ee for more information.

4 This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TII , IEEE 4 P(i,k i,k) =, i (,m], (2) P(Q m,) =, (3) P(,k Q) = η( hp), k [, ), (4) P( 3,k + 3,k) =, k [,L s ), (5) P( 2,k+ 2,k) =, k [,L c ), (6) P( 3, i,) = ( )( ), i [,m] (7) P( 2, i,) = ( )( ), i [,m], (8) P(Q 3,L s ) = P(Q 3,L c ) =. (9) Eq. () represents the probability of backoff counter decrement within the same backoff stage and (2) represents the probability of node proceeding to next backoff stage after the channel is sensed busy. Eq. (3) represents the node transiting to Idle state after the backoff expiry and (4) gives the probability of transition from Idle to CMA/CA and choosing the backoff waiting time k in the first backoff stage. Eqs. (5) and (6) express the probability of transition across the successful transmission and collision states respectively. Eqs. (7) and (8) represent the probability of node entering into successful and collision states from the last backoff period of backoff stage i respectively. Eq. (9) represents the probability of node transiting to Idle after both successful or collision transmission. imilarly, using Fig. 3, transition probabilities for unslotted can be computed as shown in ()-(5). P(i,k i,k ) =, i [,),k (,d], () P(i,k i,k ) =, i (,),k (,d], () P(i, Q) = ηhp, i [,), (2) P( 3,,k) = ( )( ), k [,d), (3) P( 2,,k) = ( ), k [,d), (4) P(Q i,d) =, i [,). (5) Eq. () represents the probability of an increase in delay within the same backoff counter which can only happen if the channel is busy due to which the delay increments without a change in the backoff counter. Eq. () gives the probability of decrement in backoff counter which happens when CCA in the state (i,k) is free and (2) gives the probability of time-critical packet arrival in Idle state and node selecting a random backoff slot in. Eqs. (3) and (4) represent the probability of node entering into successful and collision states from the last backoff period respectively. Eq. (5) represents the probability of node transiting to Idle after the critical delay expiry. sing these transition probabilities, we will now derive the individual state probabilities. (6) expresses the state probability b i,k in terms ofb, and the probabilityb, can be expressed in terms of P Q as shown in (7). ow combining (6) and (7), any CMA/CA backoff state probability can be expressed in terms of P Q as shown in (8). b i,k = i k i b i, = i k i i b,, (6) b, = P Q η( h p ), (7) b i,k = i k i i η( h p )P Q. (8) ow considering the CMA/CA transmission probabilities, the successful transmission state probability (b 3, ) can be expressed as. b 3, = ( )( ) m b i, = ( )( ) m i η( h p )P Q i= i= = ( )( m+ )P Q η( h p ). (9) imilarly, the collision state probability can be given as. m m b 2, = ( ) b i, = ( ) i η( h p )P Q i= i= = ( m+ )P Q η( h p ). (2) e now derive the rest of the state probabilities of from the Markov chain shown in Fig. 3, and the state probability p i,k can be expressed as { ( )p i+,k +p i,k, if i [, ),k (,d]) p i,k = p i,k, if i =,k (,d]. (2) The probability of a node selecting any of the random backoff states after a time-critical packet arrives can be given as p i, = PQηhp, i [, ]. (22) By making use of (2), (22) and exploiting the recursiveness, probability of any backoff state in can be formulated as below. p i,k = min( i,k ) k C j ( ) j k j P Q. (23) sing (23), the successful transmission probability (p 3, ) can be expressed as below. p 3, = ( )( ) d = ( )( ) d k= p,k k= min(,k ) k C j ( ) j k j P Q. Considering Fig. 2 and 3, by owing to chain regularities, the normalization criteria of this Markov chain can be given as P Q + m i b i,k + Ls i= + Ls b 3,k + Lc b 2,k p 2,k + p 3,k + Lc i= k= (24) d p i,k =. (25) Evaluating each summation term, the first summation term using (8) can be expressed as [ ] m i b i,k = PQη( hp) (2) m m+. (26) i= Considering the second summation term in (25) and by making use of (5) and (9), the simplified expression can be realized as below. L s b 3,k = L s ( )( m+ )P Q η( h p ). (27) ith the similar hypothesis used in deriving (27), we can (c) 28 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. ee for more information.

5 This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TII , IEEE 5 simplify the third summation term as below. L c b 2,k = L c ( m+ )P Q η( h p ). (28) The transmission probabilities for can be expressed as in (29) and (3). L s L c p 3,k = L s ( )( ) d min(,k ) p 2,k = L c ( ) d = L c ( ) d k= k= k C j ( ) j k j P Q, (29) p,k k= min(,k ) k C j ( ) j k j P Q. Finally, the sixth summation term is given by (3) i= k= d p i,k = d i= k= min( i,k ) (3) k C j ( ) j k j P Q. (3) By making use of (26)-(3) and the normalization criteria given by (25), P Q can be derived as below. P Q = { + η( hp) 2 [ (2) m+ 2 + m+ η( h p )(L s ( )+L c )( m+ )+ L s( )( ) d L c ( ) d d i= k= k= k= min(,k ) min(,k ) min( i,k ) ] + k C j ( ) j k j + k C j ( ) j k j + k C j ( ) j k j }. (32) The probability τ of a node attempting CCA in CMA/CA or attempting CCA in state (i,) of the mechanism can be given as τ = m b i, + d p,k. (33) i= sing (33), the channel busy probability can be given by (34). Equation (35) formulates the collision probability that at least one of the other ( ) nodes transmit the packet at the same time. k= = ( ( τ) )( )(L s ( )+L c ) = A. Reliability Model ( ( τ) )(L s( )+L c) +( ( τ) )(L, (34) s( )+L c) = ( ( τ) ). (35) The reliability of a node in a nonbeacon-enabled PA is defined as the fraction of generated packets that are successfully transmitted to the gateway. Eq. (36) gives the reliability of unslotted CMA/CA (R CMA ) where P fr and P fc indicate the packet failure due to collision and channel access failure within m+ backoff stages respectively.p fr in (37) gives the probability of a node getting the channel access but suffers due to collision and P fc in (38) gives the probability of a node not getting the channel access within the m+ backoff stages. R CMA = P fc P fr, (36) P fr = ( m+ ), (37) P fc = m+. (38) Reliability of unslotted (R ) is given by (39) where P de and P dc indicate the probability of a time-critical packet being discarded due to delay exceeding beyondcritdelay and packet lost due to collision respectively. R = P de P dc ( P de ). (39) The probability P de can be found using (4), where A g indicates the event that a time-critical packet was generated and event A d indicates that thus generated packet is discarded due to delay expiry. ProbabilityP dc which indicates the probability of collision is given by (4). P de = P(A d A g ) = P(Ad Ag) P(A g) = B. Delay Model = i= p i,d i= P Q min( i,d ) d C j( ) j d j, (4) P dc = ( ( τ) ). (4) The delay incurred for a successful packet transmission using unslotted CMA/CA or unslotted includes the delay for channel access and packet transmission time to the gateway. Equation (42) gives the average delay incurred in any given backoff stage i. The delay incurred by a successfully transmitted packet using CMA/CA in seconds (D CMA ) can be expressed as (43), where T b indicates the duration of a unit backoff period (32µs) and T C indicates the duration for sensing which is backoff period in unslotted CMA/CA. T s indicates the time taken for successful transmission (T b L s ). D CMA = T s +T b m D CMA,i = i [ i ( ) m+ i= k i, (42) (i+)t C + i D CMA,j ], (43) Considering the mechanism, delay incurred for the successful packet transmission in seconds can be expressed as below. D = T s +T b C. Power Consumption Model d kp,k k= d k= p,k. (44) The power consumption of the node modeled here comprises the power consumption of the radio in the Idle state, during channel access, and packet transmission, but do not consider the power consumed by the microcontroller. e (c) 28 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. ee for more information.

6 This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TII , IEEE 6 considered three power consuming states, idle during backoff waiting and in the Idle state (P i ), sensing during CCA (P sense ) and packet transmission (P tx ). Considering these three states, we express the total power consumption (P ) of the node using (45) and the power consumed in CMA/CA (PCMA ) and (P ) are given in (46) and (47) respectively. P = P i P Q +P CMA +P, (45) P CMA = P tx P = P tx [ Ls [ Ls b 3,k + Lc ] m b 2,k +P i i P i m p 3,k + Lc i= k= i i= k= b i,k + m b i,k +P sense b i,, (46) i= ] p 2,k +P sense i= k= d p i,k. (47) V. MATHEMATICAL FORMLATIO FOR LEAF ODE OPERATIG I BEACO-EABLED PA (IG LOTTED AD LOTTED CMA/CA) Fig. 4 provides the developed Markov chain model for a node using slotted and slotted CMA/CA where with a probability the node enters into and with probability η( h p ) chooses slotted CMA/CA. Each state in the developed Markov chain corresponds to a unit backoff slot duration (2 symbols). As the node enters into CMA/CA, the node selects a random backoff waiting time represented using states (i,k,j), i [,m], j [,n], k [, i ). pon the completion of backoff waiting, the node proceeds for Clear Channel Assessment (CCA, state (i,,j)) and if the channel is free, the node proceeds to CCA2 (state (i,,j)) and proceeds to transmission if free. and represent the probability of channel busy in CCA and CCA2 respectively. If CCA or CCA2 is busy in current backoff stage i, the node increments the backoff exponent and generates a backoff waiting time randomly chosen from [, i ]. This process is continued until the total backoff stages exceed the maximum backoff stages (m+) after which the packet is discarded due to channel access failure. tates ( 2, k, j), k [,L c ), j [,n] and( 3,k,j) k [,L s ), j [,n] represent the collision and successful transmission. L s and L c represent the successful packet transmission length (packet length (L p ) + Inter Frame pacing (IF) + ACK (L ack )) and collision length (L p + IF + ACK time-out duration). After collision, the node proceeds for retransmission and n represents the maximum allowed retransmissions beyond which node discards the packet. After a packet service, node checks for packet availability and if available chooses the appropriate channel mechanism else transits to Idle state. hile the states (,k), k [,d] and (,k), k [,d) represent CCA and CCA2, the states ( 3,k), k [,L s ] and ( 2,k), k [,L c ] represent successful and collision slots of. Eqs. (48) and (49) represent the transition probabilities from CCA of CMA/CA to successful and collision slots respectively, whereas (5) and (5) represent the transition probabilities from CCA of to successful and collision slots respectively. P( 3,,j i,,j) = ( )( )( ), i [,m], j [,n] (48) P( 2,,j i,,j)= ( )( ), i [,m], j [,n] (49) P( 3,,k) = ( )( )( ), k [,d) (5) P( 2,,k) = ( )( ), k [,d) (5) Here, we define a virtual state V which occurs after service completion by and CMA/CA for ease of mathematical formulation. From Fig. 4, the below transition probabilities can be inferred. From Fig. 4, the virtual state probability (P V ) can be expressed as P V = p,d + i= p i,d +p 3,Ls +p 2,Lc + b 2,Lc,n + n b 3,Ls,j + n b m,,j (+( )). (52) The Idle state probability (P Q ) can be expressed as P Q = P Q ( η)+p V ( η) = P V η η. (53) The probability p i, in terms of P V can be formulated as p i, = P V +P Q ηhp = P V hp, (54) where i [, ]. ith similar hypothesis, the probability P i,2 can be given as { pi, +( )p i+,, if i [, 2] p i,2 = (55) p i,, if i =. pon generalizing, the probability p i,k can be given by p i,k = min( i,k ) k C j ( ) j k j P V h p, i [, ], j [,d]. (56) imilarly, p,3 in terms of P V can be expressed as p,3 = p,2 +( )p,2 +p,2 = ( )p, + ( )(p, +( )p 2, )+(p, +( )p, ) PV hp = ( ) = F PV hp,3(,), (57) where F,3 is function of and. In similar way the probabilities p,k for k [,d] and p,k for k [2,d] can be expressed as below p,k = F,k (,) PV hp, k [,d], (58) p,k = ( )p,k, k [2,d]. (59) ow, the success and collision probabilities of are p 3, = ( )( ) d p,k, (6) k=2 d p 2, = ( ) p,k. (6) k= (c) 28 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. ee for more information.

7 This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TII , IEEE 7 η Q η( h p) η η( h p) Virtual state V 2, -2,Lc,,2,3,d 2,d - 3, -3,Ls -,, 2,,,,,,,, P c,2,2 2,2,2 -P -3,Ls-, c,,,,,,,3,3 2,3,3-3,, m - m,, m,, m,,,4,4 2,4,4-3,Ls-,n,d,d,d,d Markov chain model for 2,d 2,d,d,d -3,,n ,,,,n,,n -2,Lc-,,,n,,n m m,,n m,,n,,n,,n m,,n m m,-,,-, m,m-,n,-,n,-,n m,m-,n -2,,n -2,Lc-,n Markov chain model for CMA/CA Fig. 4: Proposed Markov chain model for slotted CMA/CA and channel access mechanisms of IEEE Considering the CMA/CA Markov chain, the probability of a node residing in state (,,) can be expressed as b,, = η( h p )P V +η( h p )P Q = ( h p )P V. (62) sing (62), the probability of i consecutive channel access failure can be found using (63) b i,, = (+( )) i b,, = x i b,,, (63) where x = (+( )) represents the channel access failure probability in any backoff stage. imilarly the probability for a node to retransmit can be given as b,,j = ( ( x m+ )) j b,, = y j b,,, j [,n], (64) where y = ( x m+ ) indicates the probability for node getting channel access withinmbackoff stages and occurrence of a collision. The successful and collision state probabilities in CMA/CA can be given as in (65) and (66) respectively. b 3,,j = ( )( x m+ )b,,j, j [,n], (65) b 2,,j = ( x m+ )b,,j, j [,n]. (66) The normalization property can now be expressed as P Q + m n i= k= i i= k= d p i,k + d b i,k,j + n k=2 ( Ls p,k + Ls p 3,k + Lc p 2,k + b 3,k,j + Lc ) b 2,k,j =. (67) sing (56) and (58), the first summation term in terms of P V can be written as i= k= d p i,k = d d i= k= k= min( i,k ) PV hp F,k (,) + k C j ( ) j k j P V h p = P V, and using (59), the second summation term can be given as d p,k = ( ) d k=2 k=2 PV hp F,k (,) = 2P V. (69) (68) sing (6) and (6), the third and fourth summation terms can be expressed as (7) and (7) respectively. L s p 3,k = L s ( )( )( ) d l=2 PV hp F,l (,) = 3 P V, (7) (c) 28 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. ee for more information.

8 This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TII , IEEE 8 L c p 2,k = L c ( )( ) d l=2 PV hp F,l (,) = 4P V. (7) Considering the fifth summation term, using (62), (63) and (64) it can be expressed as m n i i= k= = PV ( hp) 2 b i,k,j = m ( +( ) xm+ x n i i= b i,k,j + m (2x) m+ 2x + xm+ x n b i,,j i= ) y n+ y y n+ y ( h p )P V = 5 P V. (72) Finally, by using (65) and (66) the sixth summation can be formulated as n ( Ls b 3,k,j + Lc b 2,k,j ) = (L s ( )+L c )( x m+ ) yn+ y ( h p )P V = 6 P V. (73) By substituting (68) - (73) in (67), P V can be derived as ( P V = η η ). (74) Probability of a node attempting CCA in any given random time (τ) can be given as τ = m i= n b i,,j + d b,k. (75) k= sing (75), the probability of collision is = ( τ). (76) as given by (77), comprises of channel busy due to packet transmission ( ) and due to acknowledgment ( 2 ) which are expressed in (78) and (79). = + 2, (77) = L p ( ( τ) )( )( ), (78) 2 = L ack τ( τ) ( τ) ( ( τ) )( )( ). (79) imilarly can be derived as (8) and for more detailed derivation of, one can refer to []. A. Reliability Model = ( τ) +τ( τ) 2 ( τ) +τ( τ). (8) The reliability of a node in a beacon-enabled PA is defined as the fraction of generated packets that received the acknowledgment successfully. Reliability of slotted (R ) is given in Eq. (8), where P de and P dc indicate the probability of a time-critical packet being discarded due to delay exceeding beyond d and packet loss due to collision respectively. R = P de P dc ( P de ). (8) The probability P de can be found using Eq. (82), where A g indicates the event that a time-critical packet was generated and event A d indicates the generated packet is discarded due to delay expiry. ProbabilityP dc which indicates the probability of collision is given by Eq. (83) P de = P(A d A g ) = P(A d A g) P(A g) = = i= min( i,d ) p,d + p i,d i= P Q d C k ( ) k d k, (82) P dc = ( ( τ) ). (83) Packet losses in CMA/CA occur due to exceeded retransmissions and packet discard due to the exceeded maximum number of backoff stages. Hence the reliability of slotted CMA/CA (R CMA ) can be expressed as (84) where P fc and P fr indicate the packet failure due to channel access failure within m + backoff stages and exceeded retransmissions respectively. R CMA = P fc P fr, (84) B. Delay Model P fc = xm+ ( y n+ ) y, (85) P fr = y n+. (86) The delay incurred for a successful packet transmission using slotted CMA/CA or slotted includes the delay for channel access, packet transmission time to the gateway and time taken for the reception of acknowledgment from the gateway. Delay incurred for a successful packet transmission using can be expressed as below. D = T s +T b d kp,k ( ) k= d p,k ( ) k=, (87) where T b is the length of a unit backoff period which is 32µs and T s indicates the time taken for successful transmission (T b L s ). e make use of delay incurred for a successful transmission using CMA/CA in [] and is given by (88) ( ) D CMA = T s +E[ T h ]+ y y (n+)yn+ y n+ (T c +E[ T h ]). (88) where E[ T h ] indicates the approximate backoff delay given by (89), T c indicates the time taken for successful transmission (T b L c ) and γ = max(,( )). As deriving (88) and (89) is not our primary contribution in this paper, we advise the readers to refer [] for more insights. ( ( E[ T h ] = 2T b (+ 4 γ γ m+ 3(m+)γ m+ γ C. Power Consumption Model (2γ) 2 m+ 2γ ) + 3γ γ ( +) ), (89) The power consumption of the node modeled here comprises the power consumption of the radio in the Idle state, (c) 28 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. ee for more information.

9 This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TII , IEEE 9 TABLE II: Average power consumption of node in different states considered for analysis tate Avg. Power Consumption (µ) P i 6 P tx 6 P rx 7 P sense 7 during channel access, packet transmission, and acknowledgment reception, but do not consider the power consumed by the microcontroller. Assuming P i, P tx, P rx and P sense indicate the power consumption of the node in idle mode, transmit, receiving and sensing mode respectively, total power consumed (Ptot ) comprises of power consumption while node spends in Idle state, during mechanism (P ) and CMA/CA (PCMA ). P tot = P ip Q +P +P CMA, (9) The power consumed in states can be calculated as below P = P sense 2 +P i ( i= i= 3 d p i,k + d k= k=2 p,k ) +P tx 2 L p p i,k i= 3 L p+l ack+ p i,lp + (P rx p 3,k +P i p 2,k ), (9) k=l p+ and power consumed in CMA/CA states can be found using (92) P CMA = P i m i i= k= 2 +P tx L p i= 3 + n n m n b i,k,j +P sense (b i,,j +b i,,j ) n 2 b i,k,j +P i L p+l ack+ k=l p+ i= n b i,lp,j i= 3 VI. PERFORMACE AALI (P rx b 3,k,j +P i b 2,k,j ). (92) For the performance analysis, a star topology with nodes and a gateway is considered. Authors in [23], proposed a simplistic Monte Carlo simulation model with ideal channel conditions using C, for analyzing the performance of MAC layer. e extended the simulation model proposed in [23] to analyze the performance of in co-existence with CMA/CA. Primary assumptions in the simulation framework developed include: Traffic due to periodic beacon frame communication is negligible. Ideal channel conditions are considered. Also, we developed a real-time testbed for analyzing the realtime performance of the proposed models. e made use of commercially available IITH Motes which support Contiki 3. for the development of the testbed [24]. Each experiment comprises a fixed number of nodes deployed within line of sight range in a star topology inside a room of dimensions 7.5m x m. In [7], authors analyzed the effects of channel fading on the performance of IEEE MAC and claims the negative effect of fading on the reliability when the distance between the nodes increase beyond m. As the proposed analytical models aims at analyzing the performance of MAC layer under ideal channel conditions, we have closely deployed the nodes thereby minimizing the effects of channel conditions such as fading. Also, for validating with the experimental outcomes, we consider reliability, delay and ignore the power consumption because the power consumption of the mote includes the power consumed by the microcontroller and the radio. hereas when comparing with the simulation outcomes, we considered all the three parameters reliability, delay and power consumption. Each experiment is conducted for 3 minutes, and the performance measures provided in this paper are average taken over measurements acquired from the randomly selected leaf node every 2 seconds. e have considered two different classes of prioritized data in industrial applications with critical delays of 2.5ms and 5ms each [25] and TABLE II gives the power consumption of node in different states considered for analyzing the performance [24]. A. Performance of nonbeacon-enabled PA (ses unslotted and CMA/CA) Fig. 5(a) plotsr and R CMA versusη for = 2 and 4 with d = 8 backoff periods (2.5ms). ith an increase in η, traffic and channel congestion in the PA increases. It also increases the chances for the delay in accessing the channel to exceed d leading to a dominant loss of time-critical packets and increases number of packet collisions. Hence, unslotted CMA/CA offers better reliability compared to unslotted. By increasing from = 2 to 4 the traffic further increases resulting in more loss of packets due to channel access failure leading to further degradation in reliability of CMA/CA and. Fig. 5(b) plots the DCMA and D for d = 8, and one can observe the significant difference between delay offered by CMA/CA and. offers a very lower delay compared to CMA/CA as the channel access is faster. Also, the maximum delay for channel access of a node using will be d. ith an increase of η, the latency incurred for channel access increases and the same behavior will incur by increasing. Fig. 5(c) plots the power consumption of and CMA/CA where the power consumed by for both = 2 and = 4 are very lower compared to CMA/CA. As the number of nodes increase, the latency incurred for channel access increases due to which the power consumed by CMA/CA is less for = 2 compared to the = 4 scenario. As we increase the d, chances for channel access using increases thereby increasing R and the same can be seen from Fig. 5(d) for d = 6 backoff periods (5ms). The reliability offered by is almost identical to that of CMA/CA for both = 2 and = 4. ith the identical reliability of and CMA/CA, major advantage of using can be observed from delay and power consumption as shown in Fig. 5(e) and 5(f) respectively. Fig. 5(e) plots DCMA andd ford = 6 where thed is very lower compared to CMA/CA. imilarly, the power consumption of and CMA/CA for d = 6 is shown in Fig. 5(f) where P is negligible when compared to P CMA. Also, (c) 28 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. ee for more information.

10 This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TII , IEEE.5 R -im (=2) R -Ana (=2) R -Exp (=2) R CMA -im (=2) R -Ana (=2) CMA R -Exp (=2) CMA R -im (=4) R -Ana (=4) R -Exp (=4) R -im (=4) CMA R -Ana (=4) CMA R CMA -Exp (=4) D -im (=2) D -Ana (=2) D -Exp (=2) D CMA -im (=2) D CMA -Ana (=2) D -Exp (=2) CMA D -im (=4) D -Ana (=4) D -Exp (=4) D -im (=4) CMA D CMA -Ana (=4) D -Exp (=4) CMA P -im (=2) (a) Effect of η, on R CMA, R (d = 2.5ms) (b) Effect of η, on DCMA, D (d = 2.5ms) (c) Effect of η, on PCMA, P (d = 2.5ms) P -Ana (=2) P CMA -im (=2) P. -im (=2).8 P -Ana (=2) P -im (=2) CMA P -Ana (=2) CMA P -im (=4) P -Ana (=4) P CMA -Ana (=2) P -im (=4) P -Ana (=4) P -im (=4) CMA P -Ana (=4) CMA P -im (=4) CMA P -Ana (=4) CMA R -im (=2) R -Ana (=2) R -Exp (=2) R CMA -im (=2) R CMA -Ana (=2) R CMA -Exp (=2) R -im (=4) R -Ana (=4) R -Exp (=4) R -im (=4) CMA R -Ana (=4) CMA R -Exp (=4) (d) Effect of η, on R CMA, R (d = 5ms) R -im (=2) R -Ana (=2) R -Exp (=2) R CMA -im (=2) R CMA -Ana (=2) R CMA -Exp (=2) R -im (=4) R -Ana (=4) R -Exp (=4) R -im (=4) CMA R -Ana (=4) CMA R -Exp (=4) (e) Effect of η, on DCMA, D (d = 5ms) (f) Effect of η, on PCMA, P (d = 5ms) Fig. 5: Effect of η and on R CMA, R, D CMA, D, P CMA and P. Model parameters: L p = L s = L c = 6 backoff periods (6 bytes), h p =., macminbe = 3, m = 5, macmaxbe = 8 when compared to d = 8, in the case of d = 6, as more packets are being transmitted using the node performs CCA for more times due to which there is a little increase in delay for packet transmission and power consumption. In the case of CMA/CA, since the generation traffic remained same, RCMA, D CMA and P CMA remained almost the same although d is increased. From the performance analysis, it is observed that unslotted achieves average delay reduction of 53.3% and an average reduction in power consumption by 96% compared to unslotted CMA/CA. B. Performance of beacon-enabled PA (ses slotted and CMA/CA) Fig. 6(a) plotsr and R CMA versusη for = 2 and = 4 with a d of 8 backoff slots (2.5ms). imilar to the case of nonbeacon-enabled as η increases, the traffic and channel congestion in the PA increases.it also increases the chances for the delay in accessing the channel to exceed d leading to a dominant loss of time-critical packets. Hence slotted CMA/CA offers significantly better reliability compared to slotted. hen compared to the reliability of unslotted, as the node using slotted needs to perform CCA for C = 2 consecutively, the opportunities for accessing channel further reduces compared to unslotted leading to significant increase in packet failure due to delay expiry. By increasing from = 2 to = 4 the traffic further increases resulting in more loss of packets due to channel access failure leading to further degradation of reliability for both CMA/CA and. Fig. 6(b) plots the DCMA and D for d = 8 and one can observe the significant difference between delay offered by CMA/CA and. imilar to unslotted scenario, slotted offers a very lower delay compared to slotted CMA/CA as the channel access is faster and the maximum delay for channel access of a node using will be d. ith increase in η, the channel congestion increases and hence the latency incurred for channel access increases and the same behavior will incur with increase in. Fig. 6(c) plots the power consumption of and CMA/CA where the power consumed by for both = 2 and = 4 are very lower compared to the power consumed by CMA/CA. As number of nodes increase, the latency incurred for channel increases due to which the power consumed by CMA/CA for = 2 compared to = 4 scenario. Although the node performs channel assessment for C period before accessing the channel, it can at maximum perform 8 CCAs before accessing the channel in both slotted and unslotted for d = 8, due to which the power consumption and delay are nearly identical. One can also observe the same from Fig. 6(b) and 6(c) with delay and power consumption of slotted respectively which are identical to that of unslotted. As we increase the d, opportunities for the node to access the channel using increases thereby increasing R and the same behavior can be seen from Fig. 6(d) for d = 6 backoff slots (5ms). ith d = 6 the reliability offered by is slightly lesser than that of CMA/CA for both = 2 and = 4 due to the fact that CMA/CA has feasibility for additional retransmission (n = ). Regarding delay and power consumption still outperforms CMA/CA as shown in fig. 6(e) and 6(f) respectively. Fig. 6(e) plots the DCMA and D for d = 8 where the D is very lower compared to CMA/CA. imilarly, the power consumption of and CMA/CA for d = 6 is shown in Fig. 6(f) and the power consumed by is negligible when compared with CMA/CA. Also, when compared to d = 8, in the case of d = 6, as more packets are being transmitted using the node performs CCA for more times due to which there is a little increase in delay for packet transmission and power consumption. In the case of CMA/CA, since (c) 28 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. ee for more information.

11 This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TII , IEEE D -im (=2) D -Ana (=2) D -Exp (=2) D CMA -im (=2) D -Ana (=2) CMA D CMA -Exp (=2) D -im (=4) D -Ana (=4) D -Exp (=4) D -im (=4) CMA D CMA -Ana (=4) D CMA -Exp (=4). P -im (=2) P -Ana (=2) P -im (=2) CMA P CMA -Ana (=2) P -im (=4) P -Ana (=4) P -im (=4) CMA P -Ana (=4) CMA R -im (=2) R -Ana (=2) R -Exp (=2) R CMA -im (=2) R CMA -Ana (=2) R CMA -Exp (=2) R -im (=4) R -Ana (=4) R -Exp (=4) R CMA -im (=4) R CMA -Ana (=4) R CMA -Exp (=4) (a) Effect of η, on R CMA, R (d = 2.5ms) (b) Effect of η, on DCMA, D (d = 2.5ms) (c) Effect of η, on PCMA, P (d = 2.5ms) D -im (=2) D -Ana (=2) D -Exp (=2) D CMA -im (=2) D CMA -Ana (=2) D -Exp (=2) CMA D -im (=4) D -Ana (=4) D -Exp (=4) D -im (=4) CMA D CMA -Ana (=4) D -Exp (=4) CMA.5. P -im (=2) P -Ana (=2) P CMA -im (=2) P -Ana (=2) CMA P -im (=4) P -Ana (=4) P -im (=4) CMA P -Ana (=4) CMA R -im (=2) R -Ana (=2) R -Exp (=2) R -im (=2) CMA R -Ana (=2) CMA R CMA -Exp (=2) R -im (=4) R -Ana (=4) R -Exp (=4) R CMA -im (=4) R -Ana (=4) CMA R -Exp (=4) CMA (d) Effect of η, on R CMA, R (d = 5ms) (e) Effect of η, on DCMA, D (d = 5ms) (f) Effect of η, on PCMA, P (d = 5ms) Fig. 6: Effect of η and on R CMA, R, D CMA/CA, D, P CMA and P. Model parameters: L p = 6 backoff periods (6 bytes), L ack = backoff period ( bytes), L s = L c = 8 backoff periods, h p =., macminbe = 3, m = 5, macmaxbe = 8, n = the generation traffic remained same, RCMA, D CMA and PCMA remained almost the same although d is increased. Table III shows the performance with variation in h p for both beacon-enabled and nonbeacon-enabled PA using the proposed analytical models. Although h p varies, the underlying amount of traffic generated (η) is kept unchanged due to which one can observe a very little degradation in R, R CMA, D, D CMA, R, R CMA, D and DCMA. hereas P CMA, P CMA decrease and P, P increase as more packets use compared to CMA/CA. From the performance analysis, it is observed that slotted achieves average delay reduction of 63.3% and average reduction in power consumption by 97% when compared to slotted CMA/CA. Each simulation outcome is the average taken over realizations with each realization having a simulation length of 28 seconds. e have also indicated the 95% confidence intervals, and the analysis shows that the proposed Markov chain and mathematical formulation models the IEEE MAC layer accurately by achieving less than 5% error when compared with both the experimental and simulation outcomes. VII. COCLIO In this paper, we proposed a novel analytical model to analyze the performance of IEEE MAC layer for both beacon-enabled and nonbeacon-enabled PA. e developed a Markov chain and mathematical formulation of reliability, delay for successful packet transmission and power consumption of the node when using unslotted, slotted, unslotted CMA/CA and slotted CMA/CA. Also, a real-time testbed using commercially available IITH Motes with Contiki 3. is developed for analyzing the performance of the proposed analytical models. Validation of the proposed models using both the Monte Carlo simulations and realtime testbed shows that the proposed models analyze the performance of the network accurately by achieving less than 5% error. Also, the service differentiation offered by mechanism when used for transmission of time-critical packets is emphasized. It is observed that achieves average delay reduction of 63.3% and 53.3% compared to CMA/CA in beacon-enabled and nonbeacon-enabled PA respectively without any significant loss of reliability. also achieves an average reduction in power consumption by 97% and 96% compared to CMA/CA in beacon-enabled and nonbeaconenabled PA respectively. To the best of our knowledge, this is the first study which analyzes the performance of when operated simultaneously along with CMA/CA in both beacon-enabled and nonbeacon-enabled using an accurate analytical model. e are convinced that the model can significantly aid in the development of optimization techniques to improve the network operational efficiency. As a future scope of this work, we would like to develop and model an efficient MAC protocol mainly for industrial applications which supports multiple classes of prioritized data with different critical delay requirements considering the channel conditions. ACKOLEDGMET This work is jointly supported by Visvesvaraya PhD cheme, Ministry of Electronics and Information Technology (MEIT, Govt. of India) and Indian Institute of Technology Hyderabad, India REFERECE [] M. ollschlaeger, T. auter and J. Jasperneite, The Future of Industrial Communication: Automation etworks in the Era of the Internet of (c) 28 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. ee for more information.

THE Internet of Things (IoT) is proliferating into industrial

THE Internet of Things (IoT) is proliferating into industrial This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI.9/TII.27.2766783,

More information

IEEE modifications and their impact

IEEE modifications and their impact Mobile Information Systems 7 (2011) 69 92 69 DOI 10.3233/MIS-2011-0111 IOS Press IEEE 802.15.4 modifications and their impact M. Goyal, W. Xie and H. Hosseini Department of Computer Science, University

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Modeling of Partially Overlapping Wireless Personal Area Networks

Modeling of Partially Overlapping Wireless Personal Area Networks Modeling of Partially Overlapping Wireless Personal Area Networks 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Holger Rosier March 16, 2012 ComNets Research Group RWTH Aachen University,

More information

Chapter 2 Enhanced Back-Off Technique for IEEE WSN Standard

Chapter 2 Enhanced Back-Off Technique for IEEE WSN Standard Chapter 2 Enhanced Back-Off Technique for IEEE 802.15.4 WSN Standard Aditi Vutukuri, Saayan Bhattacharya, Tushar Raj, Sridhar, and Geetha V Abstract IEEE 802.15.4 is the standard for Low-rate Wireless

More information

sensors ISSN

sensors ISSN Sensors 2014, 14, 15610-15638; doi:10.3390/s140815610 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Analytical Model of Large Data Transactions in CoAP Networks Alessandro Ludovici

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

Novel Energy Model To Analyze The Effect Of MAC And Network Parameters On Asynchronous IEEE Multi-hop Wireless Networks Lifetime

Novel Energy Model To Analyze The Effect Of MAC And Network Parameters On Asynchronous IEEE Multi-hop Wireless Networks Lifetime Novel Energy Model To Analyze The Effect Of MAC And Network Parameters On Asynchronous IEEE 82.15.4 Multi-hop Wireless Networks Lifetime Raja Vara Prasad Y and Rajalakshmi Pachamuthu Department of Electrical

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

Performance analysis of a non-beacon enabled IEEE network with retransmission and ACK mode

Performance analysis of a non-beacon enabled IEEE network with retransmission and ACK mode 1 Performance analysis of a non-beacon enabled IEEE 802.15.4 network with retransmission and ACK mode Yang Chen *,1,3, Zhong-yi Wang 1,2,3, Lan Huang * 1,2,3 1 College of Information and Electrical Engineering,

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Collision Probability in Saturated IEEE Networks

Collision Probability in Saturated IEEE Networks in Saturated IEEE 80.11 Networks Hai L. Vu Centre for Advanced Internet Architectures (CAIA) ICT Faculty, Swinburne University of Technology Hawthorn, VIC 31, Australia h.vu@ieee.org Taka Sakurai ARC Special

More information

Experimental Framework and Simulator for the MAC of Power-Line Communications

Experimental Framework and Simulator for the MAC of Power-Line Communications Experimental Framework and Simulator for the MAC of Power-Line Communications Technical Report Christina Vlachou EPFL, Switzerland christinavlachou@epflch Julien Herzen EPFL, Switzerland julienherzen@epflch

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

A Comprehensive Analysis of the MAC Unreliability Problem in IEEE Wireless Sensor Networks

A Comprehensive Analysis of the MAC Unreliability Problem in IEEE Wireless Sensor Networks A Comprehensive Analysis of the MAC Unreliability Problem in IEEE 802.15.4 Wireless Sensor Networks Giuseppe Anastasi Dept. of Information Engineering University of Pisa, Italy E-mail: giuseppe.anastasi@iet.unipi.it

More information

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates Simulation Analysis of IEEE 802.15.4 Non-beacon Mode at Varying Data Rates Z. Abbas, N. Javaid, M. A. Khan, S. Ahmed, U. Qasim, Z. A. Khan COMSATS Institute of IT, Islamabad, Pakistan. Mirpur University

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

CHAPTER 4 CROSS LAYER INTERACTION

CHAPTER 4 CROSS LAYER INTERACTION 38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.

More information

Research Article 2017

Research Article 2017 International Journal of Emerging Research in Management &Technology Research Article May 2017 Special Issue of International Conference on Emerging Trends in Science & Engineering (ICETSE 2017) Conference

More information

Throughput and Energy Consumption Analysis of IEEE Slotted CSMA/CA. T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H.

Throughput and Energy Consumption Analysis of IEEE Slotted CSMA/CA. T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H. Throughput and Energy Consumption Analysis of IEEE 802.15.4 Slotted CSMA/CA T.R. Park, T.H. Kim, J.Y. Choi, S. Choi, and W.H. Kwon We propose a new analytic model of the IEEE 802.15.4 slotted CSMA/CA from

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Technical Report. On the Performance Limits of Slotted CSMA/CA in IEEE for Broadcast Transmissions in Wireless Sensor Networks

Technical Report. On the Performance Limits of Slotted CSMA/CA in IEEE for Broadcast Transmissions in Wireless Sensor Networks www.hurray.isep.ipp.pt Technical Report On the Performance Limits of Slotted CSMA/CA in IEEE 802.15.4 for Broadcast Transmissions in Wireless Sensor Networks Anis Koubaa Mário Alves Eduardo Tovar Ye-Qiong

More information

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone NMA Radio Networks Network Level: Medium Access Control Roberto Verdone Outline 1. Introduction 2. Fundamentals of Random MAC Aloha in Compact Networks Slotted Aloha in Compact Networks CSMA in Compact

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Book Title: ZigBee Network Protocols and Applications. Editors: Chonggang Wang, Tao Jiang and Qian Zhang

Book Title: ZigBee Network Protocols and Applications. Editors: Chonggang Wang, Tao Jiang and Qian Zhang Book Title: ZigBee Network Protocols and Applications Editors: Chonggang Wang, Tao Jiang and Qian Zhang September 9, 2009 ii Contents 1 Performance Analysis of the IEEE 802.15.4 MAC Layer 1 1.1 Introduction....................................

More information

2 Related Work. 1 Introduction. 3 Background

2 Related Work. 1 Introduction. 3 Background Modeling the Performance of A Wireless Node in Multihop Ad-Hoc Networks Ping Ding, JoAnne Holliday, Aslihan Celik {pding, jholliday, acelik}@scu.edu Santa Clara University Abstract: In this paper, we model

More information

Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks

Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks Analysis of Slotted Multi-Access Techniques for Wireless Sensor Networks Kiran Yedavalli and Bhaskar Krishnamachari Department of Electrical Engineering - Systems University of Southern California, Los

More information

Topic 02: IEEE

Topic 02: IEEE Topic 02: IEEE 802.15.4 Tuesday 20 Feb 2007 ICTP-ITU School on Wireless Networking for Scientific Applications in Developing Countries Bhaskaran Raman Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/

More information

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 137 CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 5.1 INTRODUCTION The simulation study in this chapter analyses the impact of the number

More information

Fig. 1. Superframe structure in IEEE

Fig. 1. Superframe structure in IEEE Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,

More information

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012 1 A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications I R F A N S. A L - A N B A G I, M E L I K E E R O L - K A N T A R C I, H U S S E I N T. M O U F T A H U N I V E

More information

Outline. Application examples

Outline. Application examples Outline Application examples Google page rank algorithm Aloha protocol Virtual circuit with window flow control Store-and-Forward packet-switched network Interactive system with infinite servers 1 Example1:

More information

Co-existence of WiFi and ZigBee

Co-existence of WiFi and ZigBee Co-existence of WiFi and ZigBee Kang G. Shin The University of Michigan Joint work with Xinyu Zhang ACM MobiHoc 2011 Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 1 Coexistence

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

1508 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 8, SEPTEMBER 2011

1508 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 8, SEPTEMBER 2011 1508 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 8, SEPTEMBER 2011 Reliability and Energy-Efficiency in IEEE 802.15.4/ZigBee Sensor Networks: An Adaptive and Cross-Layer Approach Mario

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

Saturated Throughput Analysis of IEEE e EDCA

Saturated Throughput Analysis of IEEE e EDCA Saturated Throughput Analysis of IEEE 80.e EDCA Lixiang Xiong, Guoqiang Mao School of Electrical and Information Engineering The University of Sydney, Sydney, NW 006, Australia Abstract IEEE 80.e standard

More information

PERFORMANCE ANALYSIS OF ZIGBEE WIRELESS SENSOR NETWORKS WITH RELAYING

PERFORMANCE ANALYSIS OF ZIGBEE WIRELESS SENSOR NETWORKS WITH RELAYING Chapter 1 PERFORMANCE ANALYSIS OF ZIGBEE WIRELESS SENSOR NETWORKS WITH RELAYING Gianluigi Ferrari, Paolo Medagliani, Marco Martalò Wireless Ad-hoc and Sensor Networks (WASN) Laboratory Department of Information

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

WIRELESS Sensor and Actuator Networks (WSANs) are

WIRELESS Sensor and Actuator Networks (WSANs) are IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, XXX Analysis and experimental evaluation of IEEE 8.5.e TSCH CSMA-CA Algorithm Domenico De Guglielmo, Beshr Al Nahas, Simon Duquennoy, Thiemo

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Improving the IEEE Slotted CSMA/CA MAC for Time-Critical Events in Wireless Sensor Networks

Improving the IEEE Slotted CSMA/CA MAC for Time-Critical Events in Wireless Sensor Networks Improving the IEEE 802.15.4 Slotted CSMA/CA MAC for Time-Critical Events in Wireless Sensor Networks Anis KOUBAA 1, Mário ALVES 1, Bilel NEFZI 2, Ye-Qiong SONG 2 1 IPP-HURRAY! Research Group, Polytechnic

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue

An Analytical Model for IEEE with Sleep Mode Based on Time-varying Queue This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2 proceedings An Analytical Model for IEEE 82.5.4 with Sleep

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, second floor Credits: 6 The IEEE 802.15.4 Protocol Stack Time Synchronization Energy Management

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

INVESTIGATION ON DELAY AND POWER MINIMIZATION IN IEEE PROTOCOL USING CSMA-CA ALGORITHM

INVESTIGATION ON DELAY AND POWER MINIMIZATION IN IEEE PROTOCOL USING CSMA-CA ALGORITHM INVESTIGATION ON DELAY AND POWER MINIMIZATION IN IEEE 802.15.4 PROTOCOL USING CSMA-CA ALGORITHM DHARA K V 1, RAJAN S 2 1ME-Applied Electronics, Department of ECE, Velalar College of Engineering and Technology,

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Supporting Deadline Monotonic Policy over Average Service Time Analysis

Supporting Deadline Monotonic Policy over Average Service Time Analysis Supporting Deadline Monotonic Policy over 802. Average Service Time Analysis Inès El Korbi Ecole Nationale des Sciences de l Informatique Laboratoire Cristal Université de la Manouba, 200 Tunisia ines.korbi@gmail.com

More information

Dynamic Reconfiguration in Beaconless IEEE Networks Under Varying Traffic Loads

Dynamic Reconfiguration in Beaconless IEEE Networks Under Varying Traffic Loads Dynamic Reconfiguration in Beaconless IEEE 82..4 Networks Under Varying Traffic Loads D Rohm, M Goyal, W Xie, B Polepalli, H Hosseini University of Wisconsin - Milwaukee Milwaukee, WI 321 USA {dmgibson,mukul,wxie,brpjr,hosseini}@uwm.edu

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols)

EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols) EP2210 FEP3210 Performance analysis of Communication networks Topic 2 Medium access control (or multiple access protocols) 1 Medium access control Lecture material: R. Rom, M. idi, Multiple access protocols,

More information

Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks

Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks Sensors 2009, 9, 2088-2116; doi:10.3390/s90302088 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor

More information

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE 802.15.4 Wireless Sensor Networks Anis KOUBAA, Mário ALVES, Eduardo TOVAR IPP-HURRAY! Research Group, Polytechnic Institute of Porto Rua Dr.

More information

ACENTRAL question in the study of multihop networks

ACENTRAL question in the study of multihop networks 1118 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 4, AUGUST 2009 The Achievable Rate Region of 80211-Scheduled Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member,

More information

Keywords Wireless Sensor Network, MAC Protocol, Markov Model, IEEE ,CSMA/CD.

Keywords Wireless Sensor Network, MAC Protocol, Markov Model, IEEE ,CSMA/CD. Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Adaptive and

More information

A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network

A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network Clemson University TigerPrints All Theses Theses 8-2017 A Cross-Layer Design for Reducing Packet Loss Caused by Fading in a Mobile Ad Hoc Network William Derek Johnson Clemson University Follow this and

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Performance Evaluation of an IEEE Sensor Network with a Star Topology

Performance Evaluation of an IEEE Sensor Network with a Star Topology Performance Evaluation of an IEEE 82.5.4 Sensor Network with a Star Topology Chandramani Kishore Singh, Anurag Kumar, and P. M. Ameer Abstract One class of applications envisaged for the IEEE 82.5.4 LR-WPAN

More information

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes

SRN Model for IEEE DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden Nodes SRN Model for IEEE 802.11 DCF MAC Protocol in Multi-hop Ad Hoc Networks with Hidden des Osama Younes and Nigel Thomas School of Computing Science, Newcastle University, UK Email: {Osama.Younes Nigel.Thomas}

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara

More information

University of Alberta. Mansoureh Takaffoli. Master of Science. Department of Computing Science

University of Alberta. Mansoureh Takaffoli. Master of Science. Department of Computing Science University of Alberta CLASS-BASED RATE DIFFERENTIATION IN WIRELESS SENSOR NETWORKS by Mansoureh Takaffoli A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the

More information

Ad Hoc b Cooperative Protocols: Performance in a Slow Fading Channel

Ad Hoc b Cooperative Protocols: Performance in a Slow Fading Channel Ad Hoc 8.b Cooperative Protocols: Performance in a Slow Fading Channel Niraj Agarwal, Divya ChanneGowda, Lakshmi Narasimhan Kannan, Marco Tacca, Andrea Fumagalli Technical Report UTD/EE//7 March 7 Ad Hoc

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

PCnet-FAST Buffer Performance White Paper

PCnet-FAST Buffer Performance White Paper PCnet-FAST Buffer Performance White Paper The PCnet-FAST controller is designed with a flexible FIFO-SRAM buffer architecture to handle traffic in half-duplex and full-duplex 1-Mbps Ethernet networks.

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

Collision Avoidance on Shared Slots in a Wireless Slotted Network: Models and Simulations

Collision Avoidance on Shared Slots in a Wireless Slotted Network: Models and Simulations Collision Avoidance on Shared Slots in a Wireless Slotted Network: Models and Simulations Pascale Minet, Paul Muhlethaler, Ines Khoufi To cite this version: Pascale Minet, Paul Muhlethaler, Ines Khoufi.

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Performance Analysis of Slotted Carrier Sense IEEE Medium Access Layer

Performance Analysis of Slotted Carrier Sense IEEE Medium Access Layer 1 Performance Analysis of Slotted Carrier Sense IEEE 802.15.4 Medium Access Layer Sofie Pollin, Student Member, IEEE, Mustafa Ergen, Sinem Coleri Ergen, Bruno Bougard Liesbet Van der Perre, Ingrid Moerman,

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator

Performance Comparison of IEEE e EDCA and b DCF Under Non- Saturation Condition using Network Simulator Research Journal of Applied Sciences, Engineering and Technology 4(22): 4748-4754, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: April 3, 212 Accepted: April 23, 212 Published: November

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

Multi-rate Opportunistic Spectrum Access in Multi-hop Ad Hoc Networks

Multi-rate Opportunistic Spectrum Access in Multi-hop Ad Hoc Networks 22nd IEEE Personal Indoor Mobile Radio Communications Multi-rate Opportunistic Spectrum Access in Multi-hop Ad Hoc Networks Ari Raptino H Graduate school of Shizuoka University Hamamatsu, Japan Email:

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

SAUCeR : a QoS-aware slotted-aloha based UWB MAC with cooperative retransmissions

SAUCeR : a QoS-aware slotted-aloha based UWB MAC with cooperative retransmissions WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2011; 11:410 425 Published online 24 May 2010 in Wiley Online Library (wileyonlinelibrary.com)..987 SPECIAL ISSUE PAPER : a QoS-aware

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #10 MAC Layer Misbehavior MAC Misbehavior Agenda Analysis of the 802.11 MAC protocol Selfish / greedy 802.11 MAC misbehavior Malicious 802.11

More information

Performance Evaluation of Different Backoff Algorithms in IEEE Using Double Sensing

Performance Evaluation of Different Backoff Algorithms in IEEE Using Double Sensing Indonesian Journal of Electrical Engineering and Computer Science Vol. 5, No. 2, February 2017, pp. 376 ~ 382 DOI: 10.11591/ijeecs.v5.i2.pp376-382 376 Performance Evaluation of Different Backoff Algorithms

More information

BUFFER STOCKS IN KANBAN CONTROLLED (TRADITIONAL) UNSATURATED MULTI-STAGE PRODUCTION SYSTEM

BUFFER STOCKS IN KANBAN CONTROLLED (TRADITIONAL) UNSATURATED MULTI-STAGE PRODUCTION SYSTEM VOL. 3, NO., FEBRUARY 008 ISSN 89-6608 006-008 Asian Research Publishing Network (ARPN). All rights reserved. BUFFER STOCKS IN KANBAN CONTROLLED (TRADITIONAL) UNSATURATED MULTI-STAGE PRODUCTION SYSTEM

More information

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA

Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Exploiting Multi-User Diversity in Wireless LANs with Channel-Aware CSMA/CA Xiaowei Wang, Mahsa Derakhshani, Tho Le-Ngoc Department of Electrical & Computer Engineering, McGill University, Montreal, QC,

More information

Throughput analysis for coexisting IEEE and networks under unsaturated traffic

Throughput analysis for coexisting IEEE and networks under unsaturated traffic Luong et al. EURASIP Journal on Wireless Communications and Networking (2016 2016:127 DOI 10.1186/s13638-016-0586-4 RESEARCH Open Access Throughput analysis for coexisting IEEE 802.15.4 and 802.11 networks

More information

Distributed Interference-aware Medium Access Control for IEEE Visible Light Communications

Distributed Interference-aware Medium Access Control for IEEE Visible Light Communications Sensors and Materials, Vol. 30, No. 8 (2018) 1665 1670 MYU Tokyo 1665 S & M 1623 Distributed Interference-aware Medium Access Control for IEEE 802.15.7 Visible Light Communications Eui-Jik Kim, 1 Jung-Hyok

More information

ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS

ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS JUAN CARLOS ARAGON SUMMIT STANFORD UNIVERSITY TABLE OF CONTENTS 1.

More information